Transfer learning for cross-company software defect prediction Y Ma, G Luo, X Zeng, A Chen Information and Software Technology 54 (3), 248-256, 2012 | 586 | 2012 |
Edge-computing-based trustworthy data collection model in the internet of things T Wang, L Qiu, AK Sangaiah, A Liu, MZA Bhuiyan, Y Ma IEEE Internet of Things Journal 7 (5), 4218-4227, 2020 | 141 | 2020 |
Gene selection for tumor classification using neighborhood rough sets and entropy measures Y Chen, Z Zhang, J Zheng, Y Ma, Y Xue Journal of biomedical informatics 67, 59-68, 2017 | 130 | 2017 |
A survey of blockchain technology on security, privacy, and trust in crowdsourcing services Y Ma, Y Sun, Y Lei, N Qin, J Lu World Wide Web 23, 393-419, 2020 | 122 | 2020 |
Measures of uncertainty for neighborhood rough sets Y Chen, Y Xue, Y Ma, F Xu Knowledge-Based Systems 120, 226-235, 2017 | 99 | 2017 |
A unified trustworthy environment establishment based on edge computing in industrial IoT T Wang, P Wang, S Cai, Y Ma, A Liu, M Xie IEEE Transactions on Industrial Informatics 16 (9), 6083-6091, 2019 | 96 | 2019 |
On software defect prediction using machine learning J Ren, K Qin, Y Ma, G Luo Journal of Applied Mathematics 2014 (1), 785435, 2014 | 68 | 2014 |
Mobile edge-enabled trust evaluation for the Internet of Things T Wang, P Wang, S Cai, X Zheng, Y Ma, W Jia, G Wang Information Fusion 75, 90-100, 2021 | 56 | 2021 |
Time sensitivity-based popularity prediction for online promotion on Twitter C Xiao, C Liu, Y Ma, Z Li, X Luo Information Sciences 525, 82-92, 2020 | 28 | 2020 |
Spatio-temporal fusion graph convolutional network for traffic flow forecasting Y Ma, H Lou, M Yan, F Sun, G Li Information Fusion 104, 102196, 2024 | 24 | 2024 |
Combining the requirement information for software defect estimation in design time Y Ma, S Zhu, K Qin, G Luo Information Processing Letters 114 (9), 469-474, 2014 | 21 | 2014 |
Kernel based asymmetric learning for software defect prediction Y Ma, G Luo, H Chen IEICE Transactions on information and systems 95 (1), 267-270, 2012 | 18 | 2012 |
Attention-based local mean k-nearest centroid neighbor classifier Y Ma, R Huang, M Yan, G Li, T Wang Expert Systems with Applications 201, 117159, 2022 | 15 | 2022 |
Asymmetric learning based on kernel partial least squares for software defect prediction G Luo, Y Ma, K Qin IEICE TRANSACTIONS on Information and Systems 95 (7), 2006-2008, 2012 | 15 | 2012 |
Active learning for software defect prediction G Luo, Y Ma, K Qin IEICE TRANSACTIONS on Information and Systems 95 (6), 1680-1683, 2012 | 15 | 2012 |
Dark-side avoidance of mobile applications with data biases elimination in socio-cyber world Y Ma, C Yu, M Yan, AK Sangaiah, Y Wu IEEE Transactions on Computational Social Systems, 2023 | 13 | 2023 |
A natural scene recognition learning based on label correlation Y Ma, Y Lei, T Wang IEEE Transactions on Emerging Topics in Computational Intelligence 6 (1 …, 2020 | 8 | 2020 |
Active learning for name entity recognition with external knowledge Y Ma, Y Zhang, AK Sangaiah, M Yan, G Li, T Wang ACM Transactions on Asian and Low-Resource Language Information Processing, 2023 | 7 | 2023 |
Combating class imbalance problem in semi-supervised defect detection Y Ma, G Luo, J Li, A Chen 2011 International Conference on Computational Problem-Solving (ICCP), 619-622, 2011 | 6 | 2011 |
DiDA: Disambiguated Domain Alignment for Cross-Domain Retrieval with Partial Labels H Liu, Y Ma, M Yan, Y Chen, D Peng, X Wang The 38th Annual AAAI Conference on Artificial Intelligence(AAAI 2024), 2024 | 4 | 2024 |